DEBIAN-CVE-2020-13529

Source
https://security-tracker.debian.org/tracker/CVE-2020-13529
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2020-13529.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2020-13529
Upstream
Published
2021-05-10T16:15:07.373Z
Modified
2026-03-17T02:41:32.965827Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.

References

Affected packages

Debian:11 / systemd

Package

Name
systemd
Purl
pkg:deb/debian/systemd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

247.*
247.3-6
247.3-7
247.3-7+deb11u1
247.3-7+deb11u2
247.3-7+deb11u3
247.3-7+deb11u4
247.3-7+deb11u5
247.3-7+deb11u6
247.3-7+deb11u7
247.9-1
247.9-2
247.9-3
247.9-4
Other
248-1
249~rc1-1
249~rc2-1
249~rc3-1
249-1
250~rc3-1
250-1
250-2
251~rc1-1
251~rc1-2
251~rc1-3
251~rc2-1
251~rc2-2
251~rc3-1
251~rc3-2
251-1
251-2
252~rc2-1
252~rc3-1
252~rc3-2
252-1
252-2
252-3
253~rc2-1
253~rc3-1
253-1
253-2
253-3
253-4
254~rc1-1
254~rc1-2
254~rc1-3
254~rc1-4
254~rc2-1
254~rc2-2
254~rc2-3
254~rc3-1
254~rc3-2
254~rc3-3
254-1
255~rc1-1
255~rc1-2
255~rc1-3
255~rc1-4
255~rc2-1
255~rc2-2
255~rc2-3
255~rc3-1
255~rc3-2
255~rc3-3
255~rc4-1
255~rc4-2
255-1
256~rc1-1~exp
256~rc1-1~exp2
256~rc2-1
256~rc2-2
256~rc2-3
256~rc3-1
256~rc3-2
256~rc3-3
256~rc3-4
256~rc3-5
256~rc3-6
256~rc3-7
256~rc4-1
256-1
256-2
257~rc1-1
257~rc1-2
257~rc1-3
257~rc1-4
257~rc2-1
257~rc2-2
257~rc2-3
257~rc3-1
257-1
257-2
258~rc1-1
258~rc2-1
258~rc2-2
258~rc3-1
258~rc4-1
258-1
259~rc1-1
259~rc2-1
259~rc3-1
259-1
260~rc1-1
260~rc1-2
260~rc2-1
260~rc3-1
260~rc4-1
248.*
248.1-1
248.2-1
248.3-1
249.*
249.1-1
249.2-1
249.2-2
249.3-1
249.3-2
249.3-3
249.3-4
249.4-1
249.4-2
249.5-1
249.5-2
249.6-1
249.6-2
249.6-3
249.7-1
250.*
250.1-2
250.2-1
250.2-2
250.2-3
250.3-1
250.3-2~bpo11+1
250.3-2
250.4-1~bpo11+1
250.4-1
251.*
251.1-1
251.2-1
251.2-2
251.2-3
251.2-4
251.2-5
251.2-6
251.2-7
251.2-8
251.3-1~bpo11+1
251.3-1
251.3-2~exp1
251.3-2~exp2
251.3-2
251.4-1
251.4-2
251.4-3
251.5-1
251.5-2
251.5-3
251.6-1
252.*
252.1-1
252.2-1
252.2-2
252.3-1
252.3-2
252.4-1~bpo11+1
252.4-1
252.4-2
252.5-1
252.5-2~bpo11+1
252.5-2
252.6-1
252.6-1+loong64
252.11-1~deb12u1
252.11-1
252.12-1~deb12u1
252.14-1~deb12u1
252.16-1~deb12u1
252.17-1~deb12u1
252.18-1~deb12u1
252.19-1~deb12u1
252.20-1~deb12u1
252.21-1~deb12u1
252.22-1~deb12u1
252.23-1~deb12u1
252.24-1~deb12u1
252.25-1~deb12u1
252.26-1~deb12u1
252.26-1~deb12u2~bpo11+1
252.26-1~deb12u2
252.27-1~deb12u1
252.28-1~deb12u1
252.29-1~deb12u1~bpo11+1
252.29-1~deb12u1
252.30-1~deb12u1
252.30-1~deb12u2
252.31-1~deb12u1
252.32-1~deb12u1
252.33-1~deb12u1
252.36-1~deb12u1
252.38-1~deb12u1
252.39-1~deb12u1
253.*
253.5-1
254.*
254.1-1
254.1-2
254.1-3
254.3-1
254.4-1
254.5-1~bpo12+1
254.5-1~bpo12+2
254.5-1~bpo12+3
254.5-1
254.14-1~bpo12+1
254.15-1~bpo12+1
254.16-1~bpo12+1
254.22-1~bpo12+1
254.26-1~bpo12+1
255.*
255.1-1
255.1-2
255.1-3
255.2-1
255.2-2
255.2-3
255.2-4
255.3-1
255.3-2
255.4-1
255.5-1
256.*
256.1-1
256.1-2
256.2-1
256.4-1
256.4-2
256.4-3
256.5-1
256.5-2
256.6-1
256.7-1
256.7-2
256.7-3
257.*
257.1-1
257.1-2
257.1-3
257.1-4
257.1-5
257.1-6
257.1-7
257.2-1
257.2-2
257.2-3
257.3-1
257.4-1
257.4-2
257.4-3
257.4-4
257.4-5
257.4-6
257.4-7
257.4-8
257.4-9
257.5-1
257.5-2
257.6-1
257.7-1
257.8-1~deb13u1
257.8-1~deb13u2
257.9-1~deb13u1
258.*
258.1-1
258.1-2
259.*
259.1-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2020-13529.json"

Debian:12 / systemd

Package

Name
systemd
Purl
pkg:deb/debian/systemd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
249.4-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2020-13529.json"

Debian:13 / systemd

Package

Name
systemd
Purl
pkg:deb/debian/systemd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
249.4-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2020-13529.json"

Debian:14 / systemd

Package

Name
systemd
Purl
pkg:deb/debian/systemd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
249.4-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2020-13529.json"